Computer Science ›› 2024, Vol. 51 ›› Issue (6A): 230800145-9.doi: 10.11896/jsjkx.230800145

• Information Security • Previous Articles     Next Articles

Operational Consistency Model Based on Consortium Blockchain for Inter-organizational Data Exchange

GENG Qian1,2, CHUAI Ziang2, JIN Jian2   

  1. 1 Center for Governance Studies,Beijing Normal University,Zhuhai,Guangdong 519087,China
    2 Department of Information Management,School of Government,Beijing Normal University,Beijing 100875,China
  • Published:2024-06-06
  • About author:GENG Qian,born in 1965,Ph.D,professor,Ph.D supervisor.His main research interests include government data mana-gement and government service.
    JIN Jian,born in 1982,Ph.D,professor.His main research interests include policy text mining and government service.
  • Supported by:
    National Social Science Foundation of China(19ATQ005) and National Nature Science Foundation of China(72374030).

Abstract: In the context of inter-organizational data sharing and exchange,maintaining strong operational consistency is a crucial technical foundation to achieve effective data synchronization.Based on blockchain technology,a model to enhance the operational consistency for inter-organizational data exchange is proposed.The model leverages a consortium blockchain as a write-ahead log,enabling databases to backtrack incomplete synchronizations.Within the consortium blockchain,a pointer structure is implemented to reduce the time required for backtracking.Additionally,data structures and consensus algorithms are designed for on-chain storage of requests.An access control mechanism is set up to verify user identities,ensuring data security and user privacy.Finally,simulation experiments are conducted to validate the reliability of the proposed model and explore the impact of a series of parameters on different evaluation metrics.The results indicate that under various parameter settings,the proposed model ensures strong operational consistency for inter-organizational data exchange.Furthermore,compared to existing baselines,it exhibits higher request execution efficiency.Moreover,the pointer structure further enhances the model’s performance,especially when there is a large amount of data stored on the chain.

Key words: Inter-organizational collaboration, Data exchange, Operational consistency, System availability, Consortium blockchain

CLC Number: 

  • TP309
[1]WANG L,WANG X,MA C D.Distributed caching strategy for data exchange program based on ontology and KNN algorithm[J].Computer Science,2016,43(S2):316-319.
[2]KARLSSON F,FROSTENSON M,PRENKERT F,et al.Inter-organisational information sharing in the public sector:A longitudinal case study on thereshaping of success factors[J].Government Information Quarterly,2017,34(4):567-577.
[3]SUSHA I,RUKANOVA B,ZUIDERWIJK A,et al.Achieving voluntary data sharing in cross sector partnerships:Three partnership models[J].Information and Organization,2023,33(1):100448.
[4]ABDELLATIF A A,SAMARA L,MOHAMED A,et al.MEdge-Chain:Leveraging edge computing and blockchain for efficient medical data exchange[J].IEEE Internet of Things Journal,2021,8(21):15762-15775.
[5]DONG Z,DAU S H,YUEN C,et al.Delay minimization for relay-based cooperative data exchange with network coding[J].IEEE/ACM Transactions on Networking,2015,23(6):1890-1902.
[6]LI T T,REN W,XIANG Y X,et al.FAPS:A fair,autonomous and privacy-preserving scheme for big data exchange based on oblivious transfer,Ether cheque and smart contracts[J].Information Sciences,2021,544:469-484.
[7]LING F,CHEN S P.Shared digital credits management mechanism of enterprise alliance based on blockchain[J].Computer Science,2021,48(S2):533-539.
[8]WANG T,MA W P,LUO W.Information sharing and secure multi-party computing model based on blockchain[J].Computer Science,2019,46(9):162-168.
[9]FENG T,JIAO Y,FANG J L,et al.Medical health data security model based on alliance blockchain[J].Computer Science,2020,47(4):305-311.
[10]ZHU P,HU J,ZHANG Y,et al.Enhancing traceability of infectious diseases:A blockchain-based approach[J].Information Processing & Management,2021,58(4):102570.
[11]LV Z H,LI X M,WANG W X,et al.Government affairs service platform for smart city[J].Future Generation Computer Systems,2018,81:443-451.
[12]PIAO C,SHI Y,YAN J,et al.Privacy-preservinggovernmental data publishing:A fog-computing-based differential privacy approach[J].Future Generation Computer Systems,2019,90:158-174.
[13]TONG W,DONG X W,SHEN Y L,et al.A blockchain-driven data exchange model in multi-domain IoT with controllability and parallelity[J].Future Generation Computer Systems,2022,135:85-94.
[14]ZHU T,GUO J W,ZHOU H,et al.Consistency and availability in distributed database systems[J].Journal of Software,2018,29(1):131-149.
[15]GILBERT S,LYNCH N A.Brewer’s conjecture and the feasibility of consistent,available,partition-tolerant web services[C]//SIGACT News.2002:51-59.
[16]VIOTTI P,VUKOLIC M.Consistency in non-transactional distributed storage systems[J].ACM Computing Surveys,2016,49(1):19.
[17]ZHAO Y,FAN B.Effect of an agency’s resources on the implementation of open government data[J].Information & Management,2021,58(4):103465-103476.
[18]DING J L,ZHOU D X,WANG J,et al.Remote database synchronization mechanism based on SQL capture from connection driver[J].Computer Engineering,2017,43(9):39-42.
[19]ZENG J X.Reflection on the development of the scientific and technical information industry based on the national science and technology management platform[J].Journal of the China Society for Scientific and Technical Information,2019,38(3):227-238.
[20]ZHANG X G,PAN J H.Research and implementation of log analyze method of MS SQL Server 2000[J].Computer Engineering and Design,2006,19:3557-3560.
[21]GEORGIOU M A,PAPHITIS A,SIRIVIANOS M,et al.Towards auto-scaling existing transactional databases with strong consistency[C]//IEEE 35th International Conference on Data Engineering Workshops.Macao,China,2019:107-112.
[22]TIAN J F,BAI W Q,JIA H Y.PGCE:A distributed storagecausal consistency model based on partial geo-replication and cloud-edge collaboration architecture[J].Computer Networks,2022,212:109065.
[23]PIAO C,HAO Y,YAN J,et al.Privacy preserving in block-chain-based government data sharing:A Service-On-Chain(SOC) approach[J].Information Processing & Management,2021,58(5):102651-102663.
[24]ALI O,SHRESTHA A,CHATFIELD A,et al.Assessing information security risks in the cloud:A case study of Australian local government authorities[J].Government Information Quarterly,2020,37(1):101419-101439.
[25]ZHENG L J,LIU J Q,TAO Y N,et al.Medical information attribute encryption access control scheme based on blockchain[J].Journal of Cyber Security,2023,8(1):93-107.
[26]SANKA A I,CHEUNG R C C.A systematic review of blockchain scalability:Issues,solutions,analysis and future research[J].Journal of Network and Computer Applications,2021,195:103232-103256.
[27]BERDIK D,OTOUM S,SCHMIDT N,et al.A survey on blockchain for information systems management and security[J].Information Processing & Management,2021,58(1):102397-102425.
[28]CAMPANILE L,IACONO M,MARULLI F,et al.Designing a GDPR compliant blockchain-based IoV distributed information tracking system[J].Information Processing & Management,2021,58(3):102511-102534.
[29]ENGIN Z,TRELEAVEN P.Algorithmic government:Automating public services and supporting civil servants in using data science technologies[J].The Computer Journal,2019,52(3):448-460.
[30]WANG L P,GUAN Z,LI Q S,et al.Survey on blockchain-based security services[J].Journal of Software,2023,34(1):1-32.
[31]GIL-GARCIA J R,GULER A,PARDO T A,et al.Characterizing the importance of clarity of roles and responsibilities in government inter-organizationalcollaboration and information sharing initiatives[J].Government Information Quarterly,2019,36(4):101393-101400.
[32]WANG H L,TIAN Y L,YIN X.Blockchain-based big dataright confirmation scheme[J].Computer Science,2018,45(2):15-19,24.
[33]ZHU X R,WU H H,HU W.FactChain:A blockchain-based crowdsourcing knowledge fusion system[J].Journal of Software,2022,33(10):3546-3564.
[34]BURCKHARDT S.Consistency in distributed systems[M].Software Engineering.Springer,2013:84-120.
[35]BERMBACH D,KUHLENKAMP J.Consistency in distributed storage systems-An overview of models,metrics and measurement approaches[C]//Networked Systems.2013:7853.
[36]LIN Y,KEMME B,PATINO M,et al.Middleware based data replication providing snapshot isolation[C]//The ACM SIGMOD.2005:419-430.
[37]NAIK N.Comprehending concurrency and consistency in distributed systems[C]//IEEE International Symposium on Systems Engineering.Vienna,Austria,2021:1-6.
[38]BURCKHARDT S,GOTSMAN A,YANG H,et al.Replicated data types:Specification,verification,optimality[C]//ACMSIGPLAN-SIGACT Symposium on Principles of Programming Languages,2014:271-284.
[39]KRASKA T,HENTSCHEL M,ALONSO M,et al.Consistency rationing in the cloud:pay only when it matters[C]//VLDB Endowment.2009:253-264.
[40]LI C,PORTO D,CLEMENT A,et al.Making geo-replicatedsystems fast as possible,consistent when necessary[C]//10th USENIX conference on Operating Systems Design and Implementation,USENIX Association,USA,2012:265-278.
[41]CHIHOUB H E,IBRAHIM S,ANTONIU G,et al.Harmony:Towards automated self-adaptive consistency in cloud storage[C]//International Conference on Cluster Computing.Beijing,China,2012:293-301.
[42]TERRY D B,PRABHAKARAN V,KOTLA R,et al.Consistency-based service level agreements for cloud storage[C]//Twenty-Fourth ACM Symposium on Operating Systems Principles.2013:309-324.
[43]LI P,PAN L,YANG X,et al.Stabilizer:Geo-replication with user-defined consistency[C]//IEEE 42nd International Conference on Distributed Computing Systems.Bologna,Italy,2022:359-369.
[44]KHELAIFA A,BENHARZALLAH S,KAHLOUL L,et al.A comparative analysis of adaptive consistency approaches in cloud storage[J].Journal of Parallel and Distributed Computing,2019,129:36-49.
[45]NORVAG K.The vagabond approach to logging and recovery in transaction-time temporal object database systems[J].IEEE Transactions on Knowledge and Data Engineering,2004,16(4):504-518.
[46]GAO S,XU J,HÄRDER T,et al.PCMLogging:Optimizingtransaction logging and recovery performance with PCM[J].IEEE Transactions on Knowledge and Data Engineering,2015,27(12):3332-3346.
[47]GOU Z A,ZHANG X,WU D N,et al.Log analysis and workload characteristic extraction in distributed storage system[J].Journal of Computer Applications,2020,40(9):2586-2593.
[48]HUANG R H,WANG J M,SONG S X,et al.Efficiently clean-ing structured event logs:A graph repair approach[J].ACM Transaction on Database Systems,2023,48(1):1-44.
[49]MUZAMMAL M,QU Q,NASRULIN B.Renovating block-chain with distributed databases:An open source system[J].Future Generation Computer Systems,2019,90:105-117.
[50]SANKA A I,IRFAN M,HUANG I,et al.A survey of breakthrough in blockchain technology:adoptions,applications,challenges and future research[J].Computer Communications,2021,169:179-201.
[51]LU G H,XIE L H,LI X Y.Comparative research of blockchain consensus algorithm[J].Computer Science,2020,47(S1):332-339.
[52]MIYACHI K,MACKEY T K.hOCBS:A privacy-preservingblockchain framework for healthcare data leveraging an on-chain and off-chain system design[J].Information Processing & Mana-gement,2021,58(3):102535-102558.
[1] KANG Zhong, WANG Maoning, MA Xiaowen, DUAN Meijiao. New Design of Redactable Consortium Blockchain Scheme Based on Multi-user Chameleon Hash [J]. Computer Science, 2024, 51(6A): 230600004-6.
[2] XIE Zhuo, ZHANG Zhi-hong, LI Lei, FENG Ying-jie, CHEN Jing. Improvement of PBFT Algorithm Based on Consortium Blockchain [J]. Computer Science, 2022, 49(11): 360-367.
[3] WANG Ri-hong, ZHOU Hang, XU Quan-qing, ZHANG Li-feng. Non-byzantine Fault Tolerance Consensus Algorithm for Consortium Blockchain [J]. Computer Science, 2021, 48(9): 317-323.
[4] MAO Han-yu, NIE Tie-zheng, SHEN De-rong, YU Ge, XU Shi-cheng, HE Guang-yu. Survey on Key Techniques and Development of Blockchain as a Service Platform [J]. Computer Science, 2021, 48(11): 4-11.
[5] E Hai-hong, HAN Peng-hao, SONG Mei-na. Conversion Method from Relational Database to Graph Database [J]. Computer Science, 2021, 48(10): 140-144.
[6] LU Zheng-fu, PU Yan-hong, NI Sheng-bin, XU Chen-ming, YANG Chun-yao. Design and Simulation of Fair Data Exchange Protocol with Bounded Rationality [J]. Computer Science, 2018, 45(11): 115-123.
[7] HAN Lin, ZHANG Chun-hai and XU Jian-liang. Data Exchange Based on QR Code in Physically Isolated Internal and External Network Environment [J]. Computer Science, 2016, 43(Z11): 520-522.
[8] WANG Li, WANG Xin and MA Chao-dong. Distributed Caching Strategy for Data Exchange Program Based on Ontology and KNN Algorithm [J]. Computer Science, 2016, 43(Z11): 316-319.
[9] REN Ke and YANG Xia. Sorting Based XML Data Exchange Algorithm [J]. Computer Science, 2014, 41(5): 223-226.
[10] ZHANG De-gang,LUO Xue-li,SHENG Jun,XU Shu-zhen and TIAN Lei. Research on Data Integration Based on ERP in Electric Power Enterprise [J]. Computer Science, 2013, 40(Z6): 160-162.
[11] SUN Qing-he and LIU Dao-qun. Discussion on Application of Technology of Network Isolation in Mobile Office Based on 3G Network [J]. Computer Science, 2013, 40(Z6): 381-383.
[12] SHI Mao,KANG Bao-sheng,YE Zheng-lin,BAI Hong-wu. Research on Degree Reduction of Parameters Curves and Surfaces [J]. Computer Science, 2010, 37(10): 233-238.
[13] HUANG Wen ,WEN Chun-sheng ,OU Hong-xin (Network Center, Hunan University of Science and Engineering, Yongzhou Hunan 425006,China). [J]. Computer Science, 2008, 35(6): 128-130.
[14] WANG Bo GUO Bo (College of Information System and Management, National University of Defense Technology, Changsha 410073). [J]. Computer Science, 2008, 35(1): 117-120.
[15] . [J]. Computer Science, 2007, 34(11): 98-102.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!